Professional Documents
Culture Documents
Question 1 It was the first generation security standard for wireless network.
Correct
b. ASC
c. WRT
d. AST
Question 2
If there's one common theme among security experts, it's that relying on one single line of defense is dangerous,
Correct
because any single defensive tool can be defeated by a determined adversary.
Mark 2.00 out of
2.00
Question 3 This is a way of protecting a computer from intrusion through the ports.
Correct
Question 4 It helps keep data and equipment safe by giving only the appropriate people access.
Incorrect
Question 5
A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure
Correct
network, creating a secure, encrypted "tunnel" across the open internet.
Mark 2.00 out of
2.00
Answer: VPN
Question 6 These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Correct
Question 7 Software designed to detect, disable, and remove viruses, worms, and Trojans.
Correct
b. virus
c. worm
d. antidote
b. GIP
c. GPS
d. WPA
Question 9 It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
Correct
b. EXE
c. RMG
d. RAM
b. secure threats
c. open threats
b. malicious attacks
c. open attacks
d. structured attacks
Question 13 It helps prevent attackers from monitoring or recording traffic between resources and computers.
Correct
b. data encryption
c. security code
Question 14 This refers to the events or attacks that steal, damage, or destroy equipment.
Correct
b. CISCO
c. Network Apps
b. common attacks
c. structured attacks
d. unstructured attacks
Question 17
Human beings are inevitably the weakest security link. You need to implement technologies and processes to
Correct
ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.
Mark 1.00 out of
1.00
Select one:
a. E-mail Security
c. Firewall
b. worm
c. virus
d. antidote
b. internal threats
c. leading threats
d. external threats
b. .jpl
c. sad mcface
d. .exe
b. protected
c. territory
Question 22 It could be exploited because of an encryption key that was vulnerable to decoding.
Correct
b. WEP 65
c. WSP 90
d. WSP 75
b. antidote
c. virus
d. worm
Question 24 A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP).
Correct
b. WSAW
c. Wi-Fi
d. WTLS
Question 25 This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector.
Incorrect
b. WSP 128
c. WSP 130
d. WEP 128